Unconditionally Secure Anonymous Encryption and Group Authentication.
Goichiro HanaokaJunji ShikataYumiko HanaokaHideki ImaiPublished in: ASIACRYPT (2002)
Keyphrases
- data encryption
- integrity verification
- encryption decryption
- security analysis
- public key cryptography
- authentication mechanism
- authentication scheme
- identity authentication
- private key
- key management
- key exchange
- image encryption
- secure communication
- user authentication
- public key
- mutual authentication
- security requirements
- key distribution
- encryption scheme
- trusted platform module
- secret key
- factor authentication
- authentication protocol
- elliptic curve cryptography
- security mechanisms
- security properties
- password authentication
- identity management
- high security
- electronic payment
- digital signature
- data security
- smart card
- image authentication
- cryptographic protocols
- data confidentiality
- security model
- secure manner
- stream cipher
- biometric authentication
- cryptographic algorithms
- encryption algorithms
- security issues
- payment systems
- digital signature scheme
- peer to peer
- rights management
- diffie hellman
- security services
- encryption algorithm
- information hiding